Conflicts: routers/user/user.gofor-closed-social
@ -0,0 +1,233 @@ | |||
// Copyright 2014 Google Inc. All Rights Reserved. | |||
// | |||
// Licensed under the Apache License, Version 2.0 (the "License"); | |||
// you may not use this file except in compliance with the License. | |||
// You may obtain a copy of the License at | |||
// | |||
// http://www.apache.org/licenses/LICENSE-2.0 | |||
// | |||
// Unless required by applicable law or agreed to in writing, software | |||
// distributed under the License is distributed on an "AS IS" BASIS, | |||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |||
// See the License for the specific language governing permissions and | |||
// limitations under the License. | |||
// Package oauth2 contains Martini handlers to provide | |||
// user login via an OAuth 2.0 backend. | |||
package oauth2 | |||
import ( | |||
"encoding/json" | |||
"fmt" | |||
"net/http" | |||
"net/url" | |||
"strings" | |||
"time" | |||
"code.google.com/p/goauth2/oauth" | |||
"github.com/go-martini/martini" | |||
"github.com/martini-contrib/sessions" | |||
) | |||
const ( | |||
codeRedirect = 302 | |||
keyToken = "oauth2_token" | |||
keyNextPage = "next" | |||
) | |||
var ( | |||
// Path to handle OAuth 2.0 logins. | |||
PathLogin = "/login" | |||
// Path to handle OAuth 2.0 logouts. | |||
PathLogout = "/logout" | |||
// Path to handle callback from OAuth 2.0 backend | |||
// to exchange credentials. | |||
PathCallback = "/oauth2callback" | |||
// Path to handle error cases. | |||
PathError = "/oauth2error" | |||
) | |||
// Represents OAuth2 backend options. | |||
type Options struct { | |||
ClientId string | |||
ClientSecret string | |||
RedirectURL string | |||
Scopes []string | |||
AuthUrl string | |||
TokenUrl string | |||
} | |||
// Represents a container that contains | |||
// user's OAuth 2.0 access and refresh tokens. | |||
type Tokens interface { | |||
Access() string | |||
Refresh() string | |||
IsExpired() bool | |||
ExpiryTime() time.Time | |||
ExtraData() map[string]string | |||
} | |||
type token struct { | |||
oauth.Token | |||
} | |||
func (t *token) ExtraData() map[string]string { | |||
return t.Extra | |||
} | |||
// Returns the access token. | |||
func (t *token) Access() string { | |||
return t.AccessToken | |||
} | |||
// Returns the refresh token. | |||
func (t *token) Refresh() string { | |||
return t.RefreshToken | |||
} | |||
// Returns whether the access token is | |||
// expired or not. | |||
func (t *token) IsExpired() bool { | |||
if t == nil { | |||
return true | |||
} | |||
return t.Expired() | |||
} | |||
// Returns the expiry time of the user's | |||
// access token. | |||
func (t *token) ExpiryTime() time.Time { | |||
return t.Expiry | |||
} | |||
// Formats tokens into string. | |||
func (t *token) String() string { | |||
return fmt.Sprintf("tokens: %v", t) | |||
} | |||
// Returns a new Google OAuth 2.0 backend endpoint. | |||
func Google(opts *Options) martini.Handler { | |||
opts.AuthUrl = "https://accounts.google.com/o/oauth2/auth" | |||
opts.TokenUrl = "https://accounts.google.com/o/oauth2/token" | |||
return NewOAuth2Provider(opts) | |||
} | |||
// Returns a new Github OAuth 2.0 backend endpoint. | |||
func Github(opts *Options) martini.Handler { | |||
opts.AuthUrl = "https://github.com/login/oauth/authorize" | |||
opts.TokenUrl = "https://github.com/login/oauth/access_token" | |||
return NewOAuth2Provider(opts) | |||
} | |||
func Facebook(opts *Options) martini.Handler { | |||
opts.AuthUrl = "https://www.facebook.com/dialog/oauth" | |||
opts.TokenUrl = "https://graph.facebook.com/oauth/access_token" | |||
return NewOAuth2Provider(opts) | |||
} | |||
// Returns a generic OAuth 2.0 backend endpoint. | |||
func NewOAuth2Provider(opts *Options) martini.Handler { | |||
config := &oauth.Config{ | |||
ClientId: opts.ClientId, | |||
ClientSecret: opts.ClientSecret, | |||
RedirectURL: opts.RedirectURL, | |||
Scope: strings.Join(opts.Scopes, " "), | |||
AuthURL: opts.AuthUrl, | |||
TokenURL: opts.TokenUrl, | |||
} | |||
transport := &oauth.Transport{ | |||
Config: config, | |||
Transport: http.DefaultTransport, | |||
} | |||
return func(s sessions.Session, c martini.Context, w http.ResponseWriter, r *http.Request) { | |||
if r.Method == "GET" { | |||
switch r.URL.Path { | |||
case PathLogin: | |||
login(transport, s, w, r) | |||
case PathLogout: | |||
logout(transport, s, w, r) | |||
case PathCallback: | |||
handleOAuth2Callback(transport, s, w, r) | |||
} | |||
} | |||
tk := unmarshallToken(s) | |||
if tk != nil { | |||
// check if the access token is expired | |||
if tk.IsExpired() && tk.Refresh() == "" { | |||
s.Delete(keyToken) | |||
tk = nil | |||
} | |||
} | |||
// Inject tokens. | |||
c.MapTo(tk, (*Tokens)(nil)) | |||
} | |||
} | |||
// Handler that redirects user to the login page | |||
// if user is not logged in. | |||
// Sample usage: | |||
// m.Get("/login-required", oauth2.LoginRequired, func() ... {}) | |||
var LoginRequired martini.Handler = func() martini.Handler { | |||
return func(s sessions.Session, c martini.Context, w http.ResponseWriter, r *http.Request) { | |||
token := unmarshallToken(s) | |||
if token == nil || token.IsExpired() { | |||
next := url.QueryEscape(r.URL.RequestURI()) | |||
http.Redirect(w, r, PathLogin+"?next="+next, codeRedirect) | |||
} | |||
} | |||
}() | |||
func login(t *oauth.Transport, s sessions.Session, w http.ResponseWriter, r *http.Request) { | |||
next := extractPath(r.URL.Query().Get(keyNextPage)) | |||
if s.Get(keyToken) == nil { | |||
// User is not logged in. | |||
http.Redirect(w, r, t.Config.AuthCodeURL(next), codeRedirect) | |||
return | |||
} | |||
// No need to login, redirect to the next page. | |||
http.Redirect(w, r, next, codeRedirect) | |||
} | |||
func logout(t *oauth.Transport, s sessions.Session, w http.ResponseWriter, r *http.Request) { | |||
next := extractPath(r.URL.Query().Get(keyNextPage)) | |||
s.Delete(keyToken) | |||
http.Redirect(w, r, next, codeRedirect) | |||
} | |||
func handleOAuth2Callback(t *oauth.Transport, s sessions.Session, w http.ResponseWriter, r *http.Request) { | |||
next := extractPath(r.URL.Query().Get("state")) | |||
code := r.URL.Query().Get("code") | |||
tk, err := t.Exchange(code) | |||
if err != nil { | |||
// Pass the error message, or allow dev to provide its own | |||
// error handler. | |||
http.Redirect(w, r, PathError, codeRedirect) | |||
return | |||
} | |||
// Store the credentials in the session. | |||
val, _ := json.Marshal(tk) | |||
s.Set(keyToken, val) | |||
http.Redirect(w, r, next, codeRedirect) | |||
} | |||
func unmarshallToken(s sessions.Session) (t *token) { | |||
if s.Get(keyToken) == nil { | |||
return | |||
} | |||
data := s.Get(keyToken).([]byte) | |||
var tk oauth.Token | |||
json.Unmarshal(data, &tk) | |||
return &token{tk} | |||
} | |||
func extractPath(next string) string { | |||
n, err := url.Parse(next) | |||
if err != nil { | |||
return "/" | |||
} | |||
return n.Path | |||
} |
@ -0,0 +1,162 @@ | |||
// Copyright 2014 Google Inc. All Rights Reserved. | |||
// | |||
// Licensed under the Apache License, Version 2.0 (the "License"); | |||
// you may not use this file except in compliance with the License. | |||
// You may obtain a copy of the License at | |||
// | |||
// http://www.apache.org/licenses/LICENSE-2.0 | |||
// | |||
// Unless required by applicable law or agreed to in writing, software | |||
// distributed under the License is distributed on an "AS IS" BASIS, | |||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |||
// See the License for the specific language governing permissions and | |||
// limitations under the License. | |||
package oauth2 | |||
import ( | |||
"net/http" | |||
"net/http/httptest" | |||
"testing" | |||
"github.com/go-martini/martini" | |||
"github.com/martini-contrib/sessions" | |||
) | |||
func Test_LoginRedirect(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
m := martini.New() | |||
m.Use(sessions.Sessions("my_session", sessions.NewCookieStore([]byte("secret123")))) | |||
m.Use(Google(&Options{ | |||
ClientId: "client_id", | |||
ClientSecret: "client_secret", | |||
RedirectURL: "refresh_url", | |||
Scopes: []string{"x", "y"}, | |||
})) | |||
r, _ := http.NewRequest("GET", "/login", nil) | |||
m.ServeHTTP(recorder, r) | |||
location := recorder.HeaderMap["Location"][0] | |||
if recorder.Code != 302 { | |||
t.Errorf("Not being redirected to the auth page.") | |||
} | |||
if location != "https://accounts.google.com/o/oauth2/auth?access_type=&approval_prompt=&client_id=client_id&redirect_uri=refresh_url&response_type=code&scope=x+y&state=" { | |||
t.Errorf("Not being redirected to the right page, %v found", location) | |||
} | |||
} | |||
func Test_LoginRedirectAfterLoginRequired(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
m := martini.Classic() | |||
m.Use(sessions.Sessions("my_session", sessions.NewCookieStore([]byte("secret123")))) | |||
m.Use(Google(&Options{ | |||
ClientId: "client_id", | |||
ClientSecret: "client_secret", | |||
RedirectURL: "refresh_url", | |||
Scopes: []string{"x", "y"}, | |||
})) | |||
m.Get("/login-required", LoginRequired, func(tokens Tokens) (int, string) { | |||
return 200, tokens.Access() | |||
}) | |||
r, _ := http.NewRequest("GET", "/login-required?key=value", nil) | |||
m.ServeHTTP(recorder, r) | |||
location := recorder.HeaderMap["Location"][0] | |||
if recorder.Code != 302 { | |||
t.Errorf("Not being redirected to the auth page.") | |||
} | |||
if location != "/login?next=%2Flogin-required%3Fkey%3Dvalue" { | |||
t.Errorf("Not being redirected to the right page, %v found", location) | |||
} | |||
} | |||
func Test_Logout(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
s := sessions.NewCookieStore([]byte("secret123")) | |||
m := martini.Classic() | |||
m.Use(sessions.Sessions("my_session", s)) | |||
m.Use(Google(&Options{ | |||
// no need to configure | |||
})) | |||
m.Get("/", func(s sessions.Session) { | |||
s.Set(keyToken, "dummy token") | |||
}) | |||
m.Get("/get", func(s sessions.Session) { | |||
if s.Get(keyToken) != nil { | |||
t.Errorf("User credentials are still kept in the session.") | |||
} | |||
}) | |||
logout, _ := http.NewRequest("GET", "/logout", nil) | |||
index, _ := http.NewRequest("GET", "/", nil) | |||
m.ServeHTTP(httptest.NewRecorder(), index) | |||
m.ServeHTTP(recorder, logout) | |||
if recorder.Code != 302 { | |||
t.Errorf("Not being redirected to the next page.") | |||
} | |||
} | |||
func Test_LogoutOnAccessTokenExpiration(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
s := sessions.NewCookieStore([]byte("secret123")) | |||
m := martini.Classic() | |||
m.Use(sessions.Sessions("my_session", s)) | |||
m.Use(Google(&Options{ | |||
// no need to configure | |||
})) | |||
m.Get("/addtoken", func(s sessions.Session) { | |||
s.Set(keyToken, "dummy token") | |||
}) | |||
m.Get("/", func(s sessions.Session) { | |||
if s.Get(keyToken) != nil { | |||
t.Errorf("User not logged out although access token is expired.") | |||
} | |||
}) | |||
addtoken, _ := http.NewRequest("GET", "/addtoken", nil) | |||
index, _ := http.NewRequest("GET", "/", nil) | |||
m.ServeHTTP(recorder, addtoken) | |||
m.ServeHTTP(recorder, index) | |||
} | |||
func Test_InjectedTokens(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
m := martini.Classic() | |||
m.Use(sessions.Sessions("my_session", sessions.NewCookieStore([]byte("secret123")))) | |||
m.Use(Google(&Options{ | |||
// no need to configure | |||
})) | |||
m.Get("/", func(tokens Tokens) string { | |||
return "Hello world!" | |||
}) | |||
r, _ := http.NewRequest("GET", "/", nil) | |||
m.ServeHTTP(recorder, r) | |||
} | |||
func Test_LoginRequired(t *testing.T) { | |||
recorder := httptest.NewRecorder() | |||
m := martini.Classic() | |||
m.Use(sessions.Sessions("my_session", sessions.NewCookieStore([]byte("secret123")))) | |||
m.Use(Google(&Options{ | |||
// no need to configure | |||
})) | |||
m.Get("/", LoginRequired, func(tokens Tokens) string { | |||
return "Hello world!" | |||
}) | |||
r, _ := http.NewRequest("GET", "/", nil) | |||
m.ServeHTTP(recorder, r) | |||
if recorder.Code != 302 { | |||
t.Errorf("Not being redirected to the auth page although user is not logged in.") | |||
} | |||
} |
@ -0,0 +1,49 @@ | |||
// Copyright 2014 The Gogs Authors. All rights reserved. | |||
// Use of this source code is governed by a MIT-style | |||
// license that can be found in the LICENSE file. | |||
package user | |||
import ( | |||
"encoding/json" | |||
"code.google.com/p/goauth2/oauth" | |||
"github.com/gogits/gogs/modules/log" | |||
"github.com/gogits/gogs/modules/oauth2" | |||
) | |||
// github && google && ... | |||
func SocialSignIn(tokens oauth2.Tokens) { | |||
transport := &oauth.Transport{} | |||
transport.Token = &oauth.Token{ | |||
AccessToken: tokens.Access(), | |||
RefreshToken: tokens.Refresh(), | |||
Expiry: tokens.ExpiryTime(), | |||
Extra: tokens.ExtraData(), | |||
} | |||
// Github API refer: https://developer.github.com/v3/users/ | |||
// FIXME: need to judge url | |||
type GithubUser struct { | |||
Id int `json:"id"` | |||
Name string `json:"login"` | |||
Email string `json:"email"` | |||
} | |||
// Make the request. | |||
scope := "https://api.github.com/user" | |||
r, err := transport.Client().Get(scope) | |||
if err != nil { | |||
log.Error("connect with github error: %s", err) | |||
// FIXME: handle error page | |||
return | |||
} | |||
defer r.Body.Close() | |||
user := &GithubUser{} | |||
err = json.NewDecoder(r.Body).Decode(user) | |||
if err != nil { | |||
log.Error("Get: %s", err) | |||
} | |||
log.Info("login: %s", user.Name) | |||
// FIXME: login here, user email to check auth, if not registe, then generate a uniq username | |||
} |